Analysis

  • max time kernel
    145s
  • max time network
    80s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/01/2024, 14:14

General

  • Target

    4e8400c70b6b6326384e04f0dbe0799a.exe

  • Size

    20KB

  • MD5

    4e8400c70b6b6326384e04f0dbe0799a

  • SHA1

    6fe9a425b7d1291418e7d9a301d72558f4aa59de

  • SHA256

    a0ac3f1d40880cf377573365abb03a95466bfd58b7aad0a1ecd46536e7f9849f

  • SHA512

    e4a1621970abe38d39b342f994652a73a314e55751c89aa0cc705ba9cacfafd9e06380f1eb71d3dc098e2d2a443b041e4caa48c875a1f9c5051b584faba1f53f

  • SSDEEP

    192:VBYsaWaVXXAc/d+zKOnPBbw3DW8XRl3kjYP1oyPqQ9Z1:Vm+qPdYnF8BlUS1x

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e8400c70b6b6326384e04f0dbe0799a.exe
    "C:\Users\Admin\AppData\Local\Temp\4e8400c70b6b6326384e04f0dbe0799a.exe"
    1⤵
      PID:2196

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2196-0-0x0000000000400000-0x0000000000405000-memory.dmp

            Filesize

            20KB

          • memory/2196-1-0x0000000000400000-0x0000000000405000-memory.dmp

            Filesize

            20KB